SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Introduction to OESIS® Framework
April
2013
Applications Manageability – OESIS Framework
The Mission
OESIS Framework
 Enables software engineers and technology vendors to develop
products that can detect, classify, and manage thousands of third-
party software applications
 Enables implementing a simple and easy compliance check of
endpoints via embedded libraries
 Supported platforms include:
 Windows
 Mac OS X
 Linux
 Android
 iOS
OESIS Framework
 Support nearly any 3rd application in the market for:
Antivirus
Antispyware
Personal Firewall
Antiphishing
Backup
Patch Management
Hard Disk Encryption
Health Agents
URL Filtering
Data Loss Prevention
Public File Sharing
Web Browsers
Desktop Sharing
VPN Clients
Virtual Machines
Device Access
Control
Mobile Applications
o Android
o iOS
 OESIS APIs for above application-types: here
AntivirusAPIs
Detection APIs
 Retrieve the name and version of the antivirus product
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing that can occur when
using only WMI
Assessment APIs
 Retrieve the count of malware signatures
 Retrieve the time of the last definition update
 Retrieve the real time protection status
 Retrieve the last full system scan time
 Retrieve the history of threat detections and actions performed to assess
the risk level of an endpoint (includes information such as threat name and
severity)
Remediation APIs
 Launch a full system scan
 Enable real time protection
 Activate an update of the virus definitions
View Supported Apps: click here
Web Browser APIs
Detection APIs
 Retrieve the name and version of the web browser
 Retrieve a list of installed browser extensions
 Check whether the browser is the default browser
 Determine which browsers are currently open on the machine
 Determine which sites are currently open in the browser
Assessment APIs
 Retrieve the browsing history
 Determine whether the browser's popup blocker is enabled
Remediation APIs
 Open a specific URL in the browser
 Close the browser
 Securely delete browsing history
View Supported Apps: click here
Hard Disk EncryptionAPIs
Detection APIs
 Retrieve the name and version of the hard disk encryption product
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing
Assessment APIs
 Check the encryption state
 Get a list of supported encryption algorithms
 Retrieve encrypted locations
Remediation APIs
 Enable Encryption
View Supported Apps: click here
Virtual Machine APIs
Detection APIs
 Retrieve the name and version of the virtual machine product
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing
Assessment APIs
 Determine if the virtual machine is running
 Retrieve a list of all VMs
 Retrieve details for each VM on the system including OS and version
Remediation APIs
 Stop a virtual machine
 Pause a virtual machine
View Supported Apps: click here
Public File SharingAPIs
Detection APIs
 Retrieve the name and version of the public file sharing application
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing
Assessment APIs
 Determine if the application is running
Remediation APIs
 Terminate the running application
View Supported Apps: click here
OESIS Developer Testing Harness
OESIS Capability Charts
By Product, by OS, by Version
Mobile Capabilities
Product Categories
iOS additional category support in 2013!
Compliance
• Antivirus
• Firewall
• Backup
Management
• MDM
• MAM
Compromising
• Monitoring
Tools
• Location
Services
• Geo
Location
Android:
 Detection
 Name
 Vendor
 Version
 Is Authentic?
 Is Running?
 Remediation
 Launch Application
MobileAPIs
iOS:
 Detection
 Name
 Vendor
 Is Running?
Android and iOS
Mobile Testing Harness
OESIS User Stories
SSL VPN
 When granting remote network access, system administrators need
the ability to assess an endpoint to ensure that it will not
compromise the security of the network. Many SSL VPN solutions
provide this ability to administrators by utilizing OESIS Framework
to help power endpoint compliance checking.
OESIS User Stories
 Dell SonicWall
OESIS User Stories
 Citrix
OESIS User stories
NAC (Network Access Control)
 NAC solutions utilize OESIS to enable the creation and checking
of access policies. The solutions use OESIS to pull data from
endpoints that can be used to determine whether users may
connect. For example, the policy might require that a device
connecting to the corporate network has all the latest antivirus
definitions installed.
OESIS User stories
 Cisco
OESIS User stories
 Juniper Networks
User stories
Support Tools
 Vendors who provide remote technology services to consumers and
businesses to fix issues or configure endpoints utilize OESIS to build in
some of their standard checks.
User stories
 F-Secure
User stories
 Support.com
User stories
Many more:
 Managed Services
 Vendors of cloud based IT Management solutions, utilize OESIS to power
features of their cloud based applications.
 Compliance solutions and vulnerability assessment
 OESIS Framework provides extensive management capabilities that enable
applications in this market segment to meet compliance requirements or to
make sure that endpoints respond to security compliance mandates.
User stories
 iPass
User stories
 LogMeIn
OPSWAT Security Score
Free demo of OESIS Framework
http://www.opswat.com/products/security-score

Weitere ähnliche Inhalte

Was ist angesagt?

AWS Monitoring & Logging
AWS Monitoring & LoggingAWS Monitoring & Logging
AWS Monitoring & LoggingJason Poley
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersLewis Ardern
 
Cloud
CloudCloud
CloudNone
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
How to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI AttacksHow to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI AttacksImperva
 
SecDevOps - The Operationalisation of Security
SecDevOps -  The Operationalisation of SecuritySecDevOps -  The Operationalisation of Security
SecDevOps - The Operationalisation of SecurityDinis Cruz
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
20170919 AWS Black Belt Online Seminar AWS Database Migration Service
20170919 AWS Black Belt Online Seminar AWS Database Migration Service20170919 AWS Black Belt Online Seminar AWS Database Migration Service
20170919 AWS Black Belt Online Seminar AWS Database Migration ServiceAmazon Web Services Japan
 
AWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsAWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsShiva Narayanaswamy
 
Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28
Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28
Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28Amazon Web Services
 
Azure active directory
Azure active directoryAzure active directory
Azure active directoryRaju Kumar
 

Was ist angesagt? (20)

AWS Monitoring & Logging
AWS Monitoring & LoggingAWS Monitoring & Logging
AWS Monitoring & Logging
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript Developers
 
Cloud
CloudCloud
Cloud
 
AWS networking fundamentals
AWS networking fundamentalsAWS networking fundamentals
AWS networking fundamentals
 
Pentesting Cloud Environment
Pentesting Cloud EnvironmentPentesting Cloud Environment
Pentesting Cloud Environment
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
How to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI AttacksHow to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI Attacks
 
SecDevOps - The Operationalisation of Security
SecDevOps -  The Operationalisation of SecuritySecDevOps -  The Operationalisation of Security
SecDevOps - The Operationalisation of Security
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
20170919 AWS Black Belt Online Seminar AWS Database Migration Service
20170919 AWS Black Belt Online Seminar AWS Database Migration Service20170919 AWS Black Belt Online Seminar AWS Database Migration Service
20170919 AWS Black Belt Online Seminar AWS Database Migration Service
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
SecDevOps
SecDevOpsSecDevOps
SecDevOps
 
Amazon GuardDuty Lab
Amazon GuardDuty LabAmazon GuardDuty Lab
Amazon GuardDuty Lab
 
AWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsAWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro Tips
 
Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28
Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28
Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28
 
Aws ppt
Aws pptAws ppt
Aws ppt
 
Azure active directory
Azure active directoryAzure active directory
Azure active directory
 
Android pentesting
Android pentestingAndroid pentesting
Android pentesting
 

Andere mochten auch

Preventing Known and Unknown Threats
Preventing Known and Unknown ThreatsPreventing Known and Unknown Threats
Preventing Known and Unknown ThreatsOPSWAT
 
Biographical information for mmf2011 int'lrev
Biographical information for mmf2011 int'lrevBiographical information for mmf2011 int'lrev
Biographical information for mmf2011 int'lrevMyra Frazier
 
Todos tienen pies
Todos tienen piesTodos tienen pies
Todos tienen piesmedhina77
 
Handbook
HandbookHandbook
Handbookghmeena
 

Andere mochten auch (7)

Preventing Known and Unknown Threats
Preventing Known and Unknown ThreatsPreventing Known and Unknown Threats
Preventing Known and Unknown Threats
 
Biographical information for mmf2011 int'lrev
Biographical information for mmf2011 int'lrevBiographical information for mmf2011 int'lrev
Biographical information for mmf2011 int'lrev
 
Kettingenwebshop
KettingenwebshopKettingenwebshop
Kettingenwebshop
 
Seguridad
SeguridadSeguridad
Seguridad
 
Todos tienen pies
Todos tienen piesTodos tienen pies
Todos tienen pies
 
Handbook
HandbookHandbook
Handbook
 
The Tea Experience
The Tea ExperienceThe Tea Experience
The Tea Experience
 

Ähnlich wie Introduction to OESIS Framework

Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointIvanti
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your Testing100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your TestingBugRaptors
 
SRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesSRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesAmazon Web Services
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewJermund Ottermo
 
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...Agile Testing Alliance
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureOPSWAT
 
Sequence Like a Boss - BriForum 2015 Denver
Sequence Like a Boss - BriForum 2015 DenverSequence Like a Boss - BriForum 2015 Denver
Sequence Like a Boss - BriForum 2015 DenverRyanWillDotcom
 
New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024ThousandEyes
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigatericharddxd
 
Webinar: Automate Your Environment Provisioning for Mobile App Development
Webinar: Automate Your Environment Provisioning for Mobile App Development Webinar: Automate Your Environment Provisioning for Mobile App Development
Webinar: Automate Your Environment Provisioning for Mobile App Development Skytap Cloud
 
Powering your Apps with Cloud Services
Powering your Apps with Cloud ServicesPowering your Apps with Cloud Services
Powering your Apps with Cloud ServicesXpand IT
 
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Kyle Lai
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Kyle Lai
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chanceDr. Anish Cheriyan (PhD)
 

Ähnlich wie Introduction to OESIS Framework (20)

Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your Testing100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your Testing
 
SRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesSRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile Services
 
Introducing ThinkPhone
Introducing ThinkPhoneIntroducing ThinkPhone
Introducing ThinkPhone
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
 
Sequence Like a Boss - BriForum 2015 Denver
Sequence Like a Boss - BriForum 2015 DenverSequence Like a Boss - BriForum 2015 Denver
Sequence Like a Boss - BriForum 2015 Denver
 
New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Test Automation for Mobile Applications
Test Automation for Mobile ApplicationsTest Automation for Mobile Applications
Test Automation for Mobile Applications
 
Mobile security
Mobile securityMobile security
Mobile security
 
Webinar: Automate Your Environment Provisioning for Mobile App Development
Webinar: Automate Your Environment Provisioning for Mobile App Development Webinar: Automate Your Environment Provisioning for Mobile App Development
Webinar: Automate Your Environment Provisioning for Mobile App Development
 
Powering your Apps with Cloud Services
Powering your Apps with Cloud ServicesPowering your Apps with Cloud Services
Powering your Apps with Cloud Services
 
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 

Mehr von OPSWAT

How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsOPSWAT
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear FacilitiesOPSWAT
 
3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations3 Cases for Quarantine Confirgurations
3 Cases for Quarantine ConfirgurationsOPSWAT
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsOPSWAT
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftOPSWAT
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation SummitOPSWAT
 
Top 10 Facts About Data Breaches
Top 10 Facts About Data BreachesTop 10 Facts About Data Breaches
Top 10 Facts About Data BreachesOPSWAT
 
Metascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxMetascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxOPSWAT
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data WorkflowOPSWAT
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizationsOPSWAT
 
Introduction to Metascan Client
Introduction to Metascan ClientIntroduction to Metascan Client
Introduction to Metascan ClientOPSWAT
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning TechnologyOPSWAT
 
The Value of Multi-scanning
The Value of Multi-scanningThe Value of Multi-scanning
The Value of Multi-scanningOPSWAT
 

Mehr von OPSWAT (15)

How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted Applications
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear Facilities
 
3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record Theft
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation Summit
 
Top 10 Facts About Data Breaches
Top 10 Facts About Data BreachesTop 10 Facts About Data Breaches
Top 10 Facts About Data Breaches
 
Metascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxMetascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for Linux
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data Workflow
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizations
 
Introduction to Metascan Client
Introduction to Metascan ClientIntroduction to Metascan Client
Introduction to Metascan Client
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning Technology
 
The Value of Multi-scanning
The Value of Multi-scanningThe Value of Multi-scanning
The Value of Multi-scanning
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Introduction to OESIS Framework

  • 1. Introduction to OESIS® Framework April 2013
  • 2. Applications Manageability – OESIS Framework The Mission
  • 3. OESIS Framework  Enables software engineers and technology vendors to develop products that can detect, classify, and manage thousands of third- party software applications  Enables implementing a simple and easy compliance check of endpoints via embedded libraries  Supported platforms include:  Windows  Mac OS X  Linux  Android  iOS
  • 4. OESIS Framework  Support nearly any 3rd application in the market for: Antivirus Antispyware Personal Firewall Antiphishing Backup Patch Management Hard Disk Encryption Health Agents URL Filtering Data Loss Prevention Public File Sharing Web Browsers Desktop Sharing VPN Clients Virtual Machines Device Access Control Mobile Applications o Android o iOS  OESIS APIs for above application-types: here
  • 5. AntivirusAPIs Detection APIs  Retrieve the name and version of the antivirus product  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing that can occur when using only WMI Assessment APIs  Retrieve the count of malware signatures  Retrieve the time of the last definition update  Retrieve the real time protection status  Retrieve the last full system scan time  Retrieve the history of threat detections and actions performed to assess the risk level of an endpoint (includes information such as threat name and severity) Remediation APIs  Launch a full system scan  Enable real time protection  Activate an update of the virus definitions View Supported Apps: click here
  • 6. Web Browser APIs Detection APIs  Retrieve the name and version of the web browser  Retrieve a list of installed browser extensions  Check whether the browser is the default browser  Determine which browsers are currently open on the machine  Determine which sites are currently open in the browser Assessment APIs  Retrieve the browsing history  Determine whether the browser's popup blocker is enabled Remediation APIs  Open a specific URL in the browser  Close the browser  Securely delete browsing history View Supported Apps: click here
  • 7. Hard Disk EncryptionAPIs Detection APIs  Retrieve the name and version of the hard disk encryption product  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing Assessment APIs  Check the encryption state  Get a list of supported encryption algorithms  Retrieve encrypted locations Remediation APIs  Enable Encryption View Supported Apps: click here
  • 8. Virtual Machine APIs Detection APIs  Retrieve the name and version of the virtual machine product  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing Assessment APIs  Determine if the virtual machine is running  Retrieve a list of all VMs  Retrieve details for each VM on the system including OS and version Remediation APIs  Stop a virtual machine  Pause a virtual machine View Supported Apps: click here
  • 9. Public File SharingAPIs Detection APIs  Retrieve the name and version of the public file sharing application  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing Assessment APIs  Determine if the application is running Remediation APIs  Terminate the running application View Supported Apps: click here
  • 11. OESIS Capability Charts By Product, by OS, by Version
  • 12. Mobile Capabilities Product Categories iOS additional category support in 2013! Compliance • Antivirus • Firewall • Backup Management • MDM • MAM Compromising • Monitoring Tools • Location Services • Geo Location
  • 13. Android:  Detection  Name  Vendor  Version  Is Authentic?  Is Running?  Remediation  Launch Application MobileAPIs iOS:  Detection  Name  Vendor  Is Running? Android and iOS
  • 15. OESIS User Stories SSL VPN  When granting remote network access, system administrators need the ability to assess an endpoint to ensure that it will not compromise the security of the network. Many SSL VPN solutions provide this ability to administrators by utilizing OESIS Framework to help power endpoint compliance checking.
  • 16. OESIS User Stories  Dell SonicWall
  • 18. OESIS User stories NAC (Network Access Control)  NAC solutions utilize OESIS to enable the creation and checking of access policies. The solutions use OESIS to pull data from endpoints that can be used to determine whether users may connect. For example, the policy might require that a device connecting to the corporate network has all the latest antivirus definitions installed.
  • 20. OESIS User stories  Juniper Networks
  • 21. User stories Support Tools  Vendors who provide remote technology services to consumers and businesses to fix issues or configure endpoints utilize OESIS to build in some of their standard checks.
  • 24. User stories Many more:  Managed Services  Vendors of cloud based IT Management solutions, utilize OESIS to power features of their cloud based applications.  Compliance solutions and vulnerability assessment  OESIS Framework provides extensive management capabilities that enable applications in this market segment to meet compliance requirements or to make sure that endpoints respond to security compliance mandates.
  • 27. OPSWAT Security Score Free demo of OESIS Framework http://www.opswat.com/products/security-score

Hinweis der Redaktion

  1. 1 min